Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

squid: cephadm: add a new SMB service to the mgr module #56898

Merged
merged 34 commits into from
Apr 16, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
34 commits
Select commit Hold shift + click to select a range
311de81
qa/tasks: change map_vips to raise exceptions instead of returning None
phlogistonjohn Feb 20, 2024
49205a3
qa/tasks: make _map_vips private
phlogistonjohn Feb 20, 2024
4d823f4
qa/tasks: fix VIPs log line
phlogistonjohn Feb 20, 2024
ecac8c0
qa/tasks: add templating functions to cephadm module
phlogistonjohn Feb 22, 2024
6bbc024
qa/tasks: replace uses of subst_vip with new templating function
phlogistonjohn Feb 22, 2024
fee97b1
cephadm: add generic methods for sharing namespaces across containers
phlogistonjohn Dec 3, 2023
0e26ff9
cephadm: add a default constant value for samba server container image
phlogistonjohn Nov 21, 2023
b4319a9
cephadm: add an SMB daemon module and classes
phlogistonjohn Dec 6, 2023
3b0a090
cephadm: import and enable deployment of SMB daemon class
phlogistonjohn Dec 6, 2023
09fb967
cephadm: add a basic deployment test for an smb daemon
phlogistonjohn Dec 6, 2023
f9d80c7
cephadm: fix issue joining to ad by using a virtual hostname
phlogistonjohn Jan 16, 2024
ced2479
mgr/cephadm: fix test failure on newer python
phlogistonjohn Dec 13, 2023
4da1721
mgr/orchestrator: clean up import style
phlogistonjohn Dec 13, 2023
1304ee0
mgr/orchestrator: fix the sorting of the imports
phlogistonjohn Dec 13, 2023
39dd0e8
mgr/cephadm: reformat the _service_classes variable
phlogistonjohn Dec 13, 2023
6bfd46b
mgr/cephadm: refactor keyring simplification out of get_keyring_with_…
phlogistonjohn Jan 5, 2024
aec7acd
python-common: reformat ServiceSpec class level service type lists
phlogistonjohn Dec 14, 2023
0af39ef
python-common: define a new SMBSpec service spec type
phlogistonjohn Dec 13, 2023
39b6d27
mgr/cephadm: add a new smb ceph service subclass
phlogistonjohn Dec 13, 2023
b8dea47
mgr/cepahdm: add various touch points to enable smb service
phlogistonjohn Jan 4, 2024
bb07baf
mgr/cephadm: add the samba container image for smb daemons
phlogistonjohn Dec 15, 2023
7e5bcc3
mgr/cephadm: simplify _get_container_image a bit
phlogistonjohn Jan 5, 2024
f6ff42f
mgr/cephadm: add some tests for the new smb service
phlogistonjohn Dec 14, 2023
08bed26
doc/cephadm: add a file documenting the smb service
phlogistonjohn Feb 10, 2024
eb12219
qa/tasks: add a new cephadm task for setting up samba ad dc
phlogistonjohn Feb 20, 2024
2beca80
qa/tasks: allow passing stdin string to cephadm shell commands
phlogistonjohn Feb 24, 2024
4ffa809
qa/tasks: add a cephadm.exclude role
phlogistonjohn Feb 26, 2024
13d68cc
qa/tasks: a new cephadm exec task similar to vip.exec but generalized
phlogistonjohn Feb 26, 2024
636f55b
qa/tasks: add a template filter to map a role name to a remote
phlogistonjohn Feb 26, 2024
bd922cf
qa/tasks: reduce duplicated code
phlogistonjohn Feb 27, 2024
5f2501f
qa/tasks: add error condition to exec functions
phlogistonjohn Feb 27, 2024
33a51aa
qa/suites/orch: add a new smb service cephadm sub-suite and test
phlogistonjohn Feb 24, 2024
39bbfe2
qa/tasks: add a cephadm samba container helper func independent of AD DC
phlogistonjohn Mar 15, 2024
b40b3a8
qa/suites/orch: add minimal smb non-AD test
synarete Mar 13, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
1 change: 1 addition & 0 deletions doc/cephadm/services/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ for details on individual services:
monitoring
snmp-gateway
tracing
smb

Service Status
==============
Expand Down
205 changes: 205 additions & 0 deletions doc/cephadm/services/smb.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,205 @@
.. _deploy-cephadm-smb-samba:

===========
SMB Service
===========

.. note:: Only the SMB3 protocol is supported.

.. warning::

SMB support is under active development and many features may be
missing or immature. Additionally, a Manager module to automate
SMB clusters and SMB shares is in development. Once that feature
is developed it will be the preferred method for managing
SMB on ceph.


Deploying Samba Containers
==========================

Cephadm deploys `Samba <http://www.samba.org>`_ servers using container images
built by the `samba-container project <http://github.com/samba-in-kubernetes/samba-container>`_.

In order to host SMB Shares with access to CephFS file systems, deploy
Samba Containers with the following command:

.. prompt:: bash #

orch apply smb <cluster_id> <config_uri> [--features ...] [--placement ...] ...

There are a number of additional parameters that the command accepts. See
the Service Specification for a description of these options.

Service Specification
=====================

An SMB Service can be applied using a specification. An example in YAML follows:

.. code-block:: yaml

service_type: smb
service_id: tango
placement:
hosts:
- ceph0
spec:
cluster_id: tango
features:
- domain
config_uri: rados://.smb/tango/scc.toml
custom_dns:
- "192.168.76.204"
join_sources:
- "rados:mon-config-key:smb/config/tango/join1.json"
include_ceph_users:
- client.smb.fs.cluster.tango

The specification can then be applied by running the following command:

.. prompt:: bash #

ceph orch apply -i smb.yaml


Service Spec Options
--------------------

Fields specific to the ``spec`` section of the SMB Service are described below.

cluster_id
A short name identifying the SMB "cluster". In this case a cluster is
simply a management unit of one or more Samba services sharing a common
configuration, and may not provide actual clustering or availability
mechanisms.

features
A list of pre-defined terms enabling specific deployment characteristics.
An empty list is valid. Supported terms:

* ``domain``: Enable domain member mode

config_uri
A string containing a (standard or de-facto) URI that identifies a
configuration source that should be loaded by the samba-container as the
primary configuration file.
Supported URI schemes include ``http:``, ``https:``, ``rados:``, and
``rados:mon-config-key:``.

join_sources
A list of strings with (standard or de-facto) URI values that will
be used to identify where authentication data that will be used to
perform domain joins are located. Each join source is tried in sequence
until one succeeds.
See ``config_uri`` for the supported list of URI schemes.

custom_dns
A list of IP addresses that will be used as the DNS servers for a Samba
container. This features allows Samba Containers to integrate with
Active Directory even if the Ceph host nodes are not tied into the Active
Directory DNS domain(s).

include_ceph_users:
A list of cephx user (aka entity) names that the Samba Containers may use.
The cephx keys for each user in the list will automatically be added to
the keyring in the container.


Configuring an SMB Service
--------------------------

.. warning::

A Manager module for SMB is under active development. Once that module
is available it will be the preferred method for managing Samba on Ceph
in an end-to-end manner. The following discussion is provided for the sake
of completeness and to explain how the software layers interact.

Creating an SMB Service spec is not sufficient for complete operation of a
Samba Container on Ceph. It is important to create valid configurations and
place them in locations that the container can read. The complete specification
of these configurations is out of scope for this document. You can refer to the
`documentation for Samba <https://wiki.samba.org/index.php/Main_Page>`_ as
well as the `samba server container
<https://github.com/samba-in-kubernetes/samba-container/blob/master/docs/server.md>`_
and the `configuation file
<https://github.com/samba-in-kubernetes/sambacc/blob/master/docs/configuration.md>`_
it accepts.

When one has composed a configuration it should be stored in a location
that the Samba Container can access. The recommended approach for running
Samba Containers within Ceph orchestration is to store the configuration
in the Ceph cluster. There are two ways to store the configuration
in ceph:

RADOS
~~~~~

A configuration file can be stored as a RADOS object in a pool
named ``.smb``. Within the pool there should be a namespace named after the
``cluster_id`` value. The URI used to identify this resource should be
constructed like ``rados://.smb/<cluster_id>/<object_name>``. Example:
``rados://.smb/tango/config.json``.

The containers are automatically deployed with cephx keys allowing access to
resources in these pools and namespaces. As long as this scheme is used
no additional configuration to read the object is needed.

To copy a configuration file to a RADOS pool, use the ``rados`` command line
tool. For example:

.. prompt:: bash #

# assuming your config file is /tmp/config.json
rados --pool=.smb --namespace=tango put config.json /tmp/config.json

MON Key/Value Store
~~~~~~~~~~~~~~~~~~~

A configuration file can be stored as a value in the Ceph Monitor Key/Value
store. The key must be named after the cluster like so:
``smb/config/<cluster_id>/<name>``. This results in a URI that can be used to
identify this configuration constructed like
``rados:mon-config-key:smb/config/<cluster_id>/<name>``.
Example: ``rados:mon-config-key:smb/config/tango/config.json``.

The containers are automatically deployed with cephx keys allowing access to
resources with the key-prefix ``smb/config/<cluster_id>/``. As long as this
scheme is used no additional configuration to read the value is needed.

To copy a configuration file into the Key/Value store use the ``ceph config-key
put ...`` tool. For example:

.. prompt:: bash #

# assuming your config file is /tmp/config.json
ceph config-key set smb/config/tango/config.json -i /tmp/config.json


HTTP/HTTPS
~~~~~~~~~~

A configuration file can be stored on an HTTP(S) server and automatically read
by the Samba Container. Managing a configuration file on HTTP(S) is left as an
exercise for the reader.

.. note:: All URI schemes are supported by parameters that accept URIs. Each
scheme has different performance and security characteristics.


Limitations
===========

A non-exhaustive list of important limitations for the SMB service follows:

* DNS is a critical component of Active Directory. If one is configuring the
SMB service for domain membership, either the Ceph host node must be
configured so that it can resolve the Active Directory (AD) domain or the
``custom_dns`` option may be used. In both cases DNS hosts for the AD domain
must still be reachable from whatever network segment the ceph cluster is on.
* Proper clustering/high-availability/"transparent state migration" is not yet
supported. If a placement causes more than service to be created these
services will act independently and may lead to unexpected behavior if clients
access the same files at once.
* Services must bind to TCP port 445. Running multiple SMB services on the same
node is not yet supported and will trigger a port-in-use conflict.
Empty file added qa/suites/orch/cephadm/smb/%
Empty file.
1 change: 1 addition & 0 deletions qa/suites/orch/cephadm/smb/.qa
1 change: 1 addition & 0 deletions qa/suites/orch/cephadm/smb/0-distro
1 change: 1 addition & 0 deletions qa/suites/orch/cephadm/smb/tasks/.qa
81 changes: 81 additions & 0 deletions qa/suites/orch/cephadm/smb/tasks/deploy_smb_basic.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,81 @@
---
roles:
# Test is for basic smb deployment & functionality. one node cluster is OK
- - host.a
- mon.a
- mgr.x
- osd.0
- osd.1
- client.0
# Reserve a host for acting as a test client
- - host.b
- cephadm.exclude
overrides:
ceph:
log-only-match:
- CEPHADM_
tasks:
# TODO: (jjm) I don't think `install` is necessary for this file. Remove?
- install:
- cephadm.configure_samba_client_container:
role: host.b
- cephadm:
- cephadm.shell:
host.a:
- ceph fs volume create cephfs
- cephadm.wait_for_service:
service: mds.cephfs
- cephadm.shell:
host.a:
# create a subvolume so we can verify that we're sharing something
- cmd: ceph fs subvolumegroup create cephfs g1
- cmd: ceph fs subvolume create cephfs sub1 --group-name=g1 --mode=0777
# Create a user access the file system from samba
- cmd: ceph fs authorize cephfs client.smbdata / rw
# Create a rados pool and store the config in it
- cmd: ceph osd pool create .smb --yes-i-really-mean-it
- cmd: ceph osd pool application enable .smb smb
- cmd: rados --pool=.smb --namespace=saserv1 put conf.toml /dev/stdin
stdin: |
samba-container-config = "v0"
[configs.saserv1]
shares = ["share1"]
globals = ["default", "domain"]
instance_name = "SAMBA"
[shares.share1.options]
"vfs objects" = "ceph"
path = "/"
"ceph:config_file" = "/etc/ceph/ceph.conf"
"ceph:user_id" = "smbdata"
"kernel share modes" = "no"
"read only" = "no"
"browseable" = "yes"
[globals.default.options]
"server min protocol" = "SMB2"
"load printers" = "no"
"printing" = "bsd"
"printcap name" = "/dev/null"
"disable spoolss" = "yes"
"guest ok" = "no"
[globals.domain.options]
security = "USER"
workgroup = "STANDALONE1"
[[users.all_entries]]
name = "smbuser1"
password = "insecure321"
- cephadm.apply:
specs:
- service_type: smb
service_id: saserv1
placement:
count: 1
cluster_id: saserv1
config_uri: "rados://.smb/saserv1/conf.toml"
include_ceph_users:
- "client.smbdata"
- cephadm.wait_for_service:
service: smb.saserv1
- cephadm.exec:
host.b:
- sleep 30
- "{{ctx.samba_client_container_cmd|join(' ')}} smbclient -U smbuser1%insecure321 //{{'host.a'|role_to_remote|attr('ip_address')}}/share1 -c ls"
92 changes: 92 additions & 0 deletions qa/suites/orch/cephadm/smb/tasks/deploy_smb_domain.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,92 @@
roles:
# Test is for basic smb deployment & functionality. one node cluster is OK
- - host.a
- mon.a
- mgr.x
- osd.0
- osd.1
- client.0
# Reserve a host for acting as a domain controller
- - host.b
- cephadm.exclude
overrides:
ceph:
log-only-match:
- CEPHADM_
tasks:
- cephadm.deploy_samba_ad_dc:
role: host.b
- cephadm:

- cephadm.shell:
host.a:
- ceph fs volume create cephfs
- cephadm.wait_for_service:
service: mds.cephfs

- cephadm.shell:
host.a:
# create a subvolume so we can verify that we're sharing something
- cmd: ceph fs subvolumegroup create cephfs g1
- cmd: ceph fs subvolume create cephfs sub1 --group-name=g1 --mode=0777
# Create a user access the file system from samba
- cmd: ceph fs authorize cephfs client.smbdata / rw
# Create a rados pool and store the config in it
- cmd: ceph osd pool create .smb --yes-i-really-mean-it
- cmd: ceph osd pool application enable .smb smb
- cmd: rados --pool=.smb --namespace=admem1 put conf.toml /dev/stdin
stdin: |
samba-container-config = "v0"
[configs.admem1]
shares = ["share1"]
globals = ["default", "domain"]
instance_name = "SAMBA"
[shares.share1.options]
"vfs objects" = "ceph"
path = "/"
"ceph:config_file" = "/etc/ceph/ceph.conf"
"ceph:user_id" = "smbdata"
"kernel share modes" = "no"
"read only" = "no"
"browseable" = "yes"
[globals.default.options]
"server min protocol" = "SMB2"
"load printers" = "no"
"printing" = "bsd"
"printcap name" = "/dev/null"
"disable spoolss" = "yes"
"guest ok" = "no"
[globals.domain.options]
security = "ads"
workgroup = "DOMAIN1"
realm = "domain1.sink.test"
"idmap config * : backend" = "autorid"
"idmap config * : range" = "2000-9999999"
# Store the join auth user/pass in the config-key store
- cmd: ceph config-key set smb/config/admem1/join1.json -i -
stdin: |
{"username": "Administrator", "password": "Passw0rd"}

- cephadm.apply:
specs:
- service_type: smb
service_id: admem1
placement:
count: 1
cluster_id: admem1
features:
- domain
config_uri: "rados://.smb/admem1/conf.toml"
custom_dns:
- "{{ctx.samba_ad_dc_ip}}"
join_sources:
- "rados:mon-config-key:smb/config/admem1/join1.json"
include_ceph_users:
- "client.smbdata"
- cephadm.wait_for_service:
service: smb.admem1

- cephadm.exec:
host.b:
- sleep 30
- "{{ctx.samba_client_container_cmd|join(' ')}} smbclient -U DOMAIN1\\\\ckent%1115Rose. //{{'host.a'|role_to_remote|attr('ip_address')}}/share1 -c ls"